This is not the latest report. Click
here to view the latest report.
CVSS v3.1 Statistics for McAfee (DEFUNCT) as of 06/17/2020
0
320
40
226
Reference
0-69.9%
|
|
Contributor |
70.6
Contributor
70-94.9%
Provider
95-100%
| CVE | CNA Value | Alignment | NIST Value | Reason |
|---|---|---|---|---|
| CVE-2019-3613 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) None | ≠ | Confidentiality (C) High | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | ≠ | Availability (A) High | No limiting factors for availability listed | |
| CVE-2019-3617 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2019-3640 (6 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2019-3648 (4 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) None | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) Low | ≠ | Availability (A) High | Assessment performed prior to CVMAP efforts | |
| CVE-2019-3654 (4 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) None | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) None | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) High | Availability (A) High | |||
|
CVE-2019-3663
(6 of 8)
|
Attack Vector (AV) Network | ≠ | Attack Vector (AV) Local | Assessment performed prior to CVMAP efforts |
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2019-3665 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2019-3666 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2019-3667 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) Low | ≠ | Availability (A) High | Assessment performed prior to CVMAP efforts | |
| CVE-2019-3670 (5 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) None | Privileges Required (PR) None | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) Low | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | ≠ | Integrity (I) Low | Assessment performed prior to CVMAP efforts | |
| Availability (A) None | Availability (A) None | |||
| CVE-2020-7250 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7251 (4 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
| Integrity (I) Low | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) None | Availability (A) None | |||
| CVE-2020-7252 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | ≠ | Privileges Required (PR) None | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) None | Integrity (I) None | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7253 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | ≠ | Availability (A) None | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7254 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7255 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) Low | Availability (A) Low | |||
| CVE-2020-7256 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2020-7257 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | ≠ | Attack Complexity (AC) High | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7258 (8 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) Required | User Interaction (UI) Required | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) None | Availability (A) None | |||
| CVE-2020-7259 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) Low | ≠ | Availability (A) High | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7260 (5 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | ≠ | Privileges Required (PR) None | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) None | ≠ | User Interaction (UI) Required | Assessment performed prior to CVMAP efforts | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7261 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
| Integrity (I) Low | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) None | Availability (A) None | |||
| CVE-2020-7263 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7264 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7265 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7266 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7267 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | Scope (S) Changed | |||
| Confidentiality (C) High | ≠ | Confidentiality (C) None | No limiting factors for confidentiality listed | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7273 (4 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) None | Confidentiality (C) None | |||
| Integrity (I) Low | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) High | ≠ | Availability (A) None | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7274 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) Low | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) Low | ≠ | Availability (A) High | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7275 (7 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Unchanged | Scope (S) Unchanged | |||
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) Low | Availability (A) Low | |||
| CVE-2020-7276 (3 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) High | Privileges Required (PR) High | |||
| User Interaction (UI) Required | ≠ | User Interaction (UI) None | Assessment performed prior to CVMAP efforts | |
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) High | Assessment performed prior to CVMAP efforts | |
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) Low | ≠ | Availability (A) High | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7277 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) None | ≠ | Privileges Required (PR) Low | Assessment performed prior to CVMAP efforts | |
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | Confidentiality (C) Low | |||
| Integrity (I) Low | Integrity (I) Low | |||
| Availability (A) Low | Availability (A) Low | |||
| CVE-2020-7278 (4 of 8) | Attack Vector (AV) Network | Attack Vector (AV) Network | ||
| Attack Complexity (AC) Low | Attack Complexity (AC) Low | |||
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) Low | ≠ | Confidentiality (C) None | Assessment performed prior to CVMAP efforts | |
| Integrity (I) Low | ≠ | Integrity (I) High | Assessment performed prior to CVMAP efforts | |
| Availability (A) Low | ≠ | Availability (A) None | Assessment performed prior to CVMAP efforts | |
| CVE-2020-7285 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | No Race Condition, implementation specific secrets required or MiTM identified for NVD analyst | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Unclear if Scope change occurs. No identification of security boundaries being crossed. | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7286 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7287 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7288 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7289 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7290 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High | |||
| CVE-2020-7291 (6 of 8) | Attack Vector (AV) Local | Attack Vector (AV) Local | ||
| Attack Complexity (AC) High | ≠ | Attack Complexity (AC) Low | Assessment performed prior to CVMAP efforts | |
| Privileges Required (PR) Low | Privileges Required (PR) Low | |||
| User Interaction (UI) None | User Interaction (UI) None | |||
| Scope (S) Changed | ≠ | Scope (S) Unchanged | Assessment performed prior to CVMAP efforts | |
| Confidentiality (C) High | Confidentiality (C) High | |||
| Integrity (I) High | Integrity (I) High | |||
| Availability (A) High | Availability (A) High |